David Strom

David Strom writes and speaks about security, networking and communications topics for CSO Online, Network World, Computerworld, and other publications. He can be reached through his web site, or on Twitter @dstrom.

This is the second in a series of articles on how to successfully and securely deploy smart home technology. The first decision you need to make in your smart home journey is selecting the right ecosystem.

First in a series of articles on the best ways to deploy and secure smart home technology.

In this review, we looked at five email encryption products, four of which employ encryption gateways and one that’s end-to-end. The gateways usually rely on plug-ins to Outlook and browsers so you can continue using your existing...

After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends.

The 10 products we tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats. They evaluate these threats in a larger ecosystem, combining the best aspects from network intrusion...

The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule...

While there is no single endpoint security product that can suit all situations, endpoint configurations and IT requirements, there are a few key things to consider in your purchase.

The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products.

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage,...